BATTLEFIELD INTELLIGENCE: A PRIMER ON COLLECTION & EXPLOITATION Extremely valuable primer on collecting intel in the field. Stay Alert, Stay Armed and Stay Dangerous!
Category: Cyber Espionage
Dose of Truth: The “Future” of War is Now
If any of you have ever read the book Ghost Fleet by P.W. Singer you would realize with a chill down your spine that more and more things listed in that fictional work regarding Military Technology is beginning to unfold right before our eyes. The recent unveiling of China’s new Dark Sword Drone makes the…
How Search Algorithims Manipulate You
A recent article about how Google and YouTube Search Algorithims are manipulated got me to thinking. So I emailed a good friend of mine, Mr. A, with my concerns. Mr. A works on the security side of the IT industry. Here is what he had to say: Technology and information warfare have reached a…
The Surveillance State: Big Brother Will Soon Be Able To Legally Hack You
The Feds Will Soon Be Able to Legally Hack Almost Anyone (click on the above link to be re-directed to source page) Well if you have been keeping up, this is no friggin’ surprise. But like all things, there is a work around to Big Brother’s antics. Remember, A Civilian Operator’s Cyber skill-set in the…
Cyber-Warfare Update: iPhone Weaknesses Made Apparent by Israeli “Digital Arms” Company
Apple boosts iPhone security after Israeli spyware reveals startling weaknesses (click on above link to be re-directed to source page) Leave it to a bunch of retired Mossad Cyber-Spies to start up a “Digital Arms” Company and wreak havok on the most “secure phone on the planet”. The Silicon “Wadi” not Valley, Strikes Again!…
Surveillance State: Ways Your Wi-Fi Router Can Spy on You
All the Ways Your Wi-Fi Router Can Spy on You (click on above link to be re-directed) Overall, not surprising news by a long shot but you may be shocked at the WAYS in which it can spy on you, specifically, programs like Wi-Key. Like all Technology in the tight hands tools like this could…
Espionage Files: Brit Spies Used URL Shortener to Honeypot Arab Spring Dissidents
A shadowy unit of the British intelligence agency GCHQ tried to influence online activists during the 2009 Iranian presidential election protests and the 2011 democratic uprisings largely known as the Arab Spring, as new evidence gathered from documents leaked by Edward Snowden shows. The GCHQ’s special unit, known as the Joint Threat Research Intelligence Group…
Understanding 4th Generation Warfare: The Real Paranoia Inducing Purpose of Russian Hacks
For six months, starting in the fall of 2014, I investigated a shadowy online Russian propaganda operation called the Internet Research Agency. The agency has been widely reported in Russian media to be the brainchild of Evgeny Prigozhin, an oligarch and ally of Vladimir Putin. At the time, it employed hundreds of Russians in a…
Examining Terrorist Tactics: The Jihadist Comms Toolkit
A new report documents how extremist groups’ use of secure digital tools software has evolved. “I don’t think that there are too many [makers of encrypted communication tools who] can say that bad guys don’t use their stuff, accurately,” NSA deputy director Richard Ledgett said during the recent Defense One Tech Summit, describing ISIS’ use…
The Surveillance State: Drones and The End of Society
The human race is on the brink of momentous and dire change. It is a change that potentially smashes our institutions and warps our society beyond recognition. It is also a change to which almost no one is paying attention. I’m talking about the coming obsolescence of the gun-wielding human infantryman as a weapon of…